Malware detection by pruning of parallel ensembles using harmony search

作者: Shina Sheen , R. Anitha , P. Sirisha

DOI: 10.1016/J.PATREC.2013.05.006

关键词:

摘要: … idea of pruning ensemble using Harmony search which is a music inspired algorithm. The pruned … Multiple heterogeneous classifiers in parallel fashion are used for constructing the …

参考文章(32)
Shina Sheen, S. V. Aishwarya, R. Anitha, S. V. Raghavan, S. M. Bhaskar, Ensemble pruning using harmony search hybrid artificial intelligence systems. pp. 13- 24 ,(2012) , 10.1007/978-3-642-28931-6_2
Zong Woo Geem, Music-Inspired Harmony Search Algorithm: Theory and Applications Music-Inspired Harmony Search Algorithm: Theory and Applications 1st. pp. 206- 206 ,(2009)
Boyun Zhang, Jianping Yin, Jingbo Hao, Dingxing Zhang, Shulin Wang, Malicious codes detection based on ensemble learning autonomic and trusted computing. pp. 468- 477 ,(2007) , 10.1007/978-3-540-73547-2_48
M. Zubair Shafiq, S. Momina Tabish, Fauzan Mirza, Muddassar Farooq, PE-Miner: Mining Structural Information to Detect Malicious Executables in Realtime recent advances in intrusion detection. pp. 121- 141 ,(2009) , 10.1007/978-3-642-04342-0_7
Thomas G. Dietterich, Dragos D. Margineantu, Pruning Adaptive Boosting international conference on machine learning. pp. 211- 218 ,(1997)
Grigorios Tsoumakas, Ioannis Partalas, Ioannis Vlahavas, An Ensemble Pruning Primer Applications of Supervised and Unsupervised Ensemble Methods. pp. 1- 13 ,(2009) , 10.1007/978-3-642-03999-7_1
Christino Tamon, Jie Xiang, On the Boosting Pruning Problem european conference on machine learning. pp. 404- 412 ,(2000) , 10.1007/3-540-45164-1_41
Zhi-Hua Zhou, Wei Tang, Selective ensemble of decision trees granular computing. pp. 476- 483 ,(2003) , 10.1007/3-540-39205-X_81
Gary McGraw, Greg Morrisett, Attacking Malicious Code: A Report to the Infosec Research Council IEEE Software. ,vol. 17, pp. 33- 41 ,(2000) , 10.1109/52.877857
Andreas L. Prodromidis, Salvatore J. Stolfo, Cost Complexity-Based Pruning of Ensemble Classifiers Knowledge and Information Systems. ,vol. 3, pp. 449- 469 ,(2001) , 10.1007/PL00011678